☆71Oct 31, 2023Updated 2 years ago
Alternatives and similar repositories for pocs
Users that are interested in pocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- ☆30Sep 5, 2025Updated 6 months ago
- Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6☆96Jul 21, 2022Updated 3 years ago
- ☆53Nov 11, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- 웹 브라우저 취약점 탐지 자동화 프로젝트☆11Jan 8, 2022Updated 4 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"☆306Feb 26, 2022Updated 4 years ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Jun 18, 2022Updated 3 years ago
- C# Utilities for Windows Notification Facility☆159Apr 14, 2025Updated 11 months ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Mar 27, 2022Updated 3 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 4 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- ☆246Sep 6, 2022Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆260Sep 1, 2022Updated 3 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- Our PoC for the vulnerable products☆46Dec 1, 2021Updated 4 years ago
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆51Jan 31, 2025Updated last year
- c# reverse shell poc☆26Dec 22, 2025Updated 3 months ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 4 years ago
- ☆37May 8, 2022Updated 3 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆906Updated this week
- ☆832Sep 9, 2022Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- ☆15Nov 3, 2023Updated 2 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Feb 14, 2022Updated 4 years ago